Analysis
-
max time kernel
0s -
max time network
41s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 18:24
Static task
static1
Behavioral task
behavioral1
Sample
0b9f04b7f5c0dcd3f9c2f8a142abaa56.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0b9f04b7f5c0dcd3f9c2f8a142abaa56.html
Resource
win10v2004-20231215-en
General
-
Target
0b9f04b7f5c0dcd3f9c2f8a142abaa56.html
-
Size
953B
-
MD5
0b9f04b7f5c0dcd3f9c2f8a142abaa56
-
SHA1
a1a39a1f3455acc7a0ad4d39a8be325c237fd3b0
-
SHA256
e67e00a47cf7cb5ce7237467190505a6925d48228e6188cd31c64662a2dfab81
-
SHA512
b541c351043c0678a1d8238f9bb62c2629d6ad9431acee9086fedabc744a009d96879b5ec2aad653e61a816b20d3801cba8b9167f135d9d0e1b30a415ad9ca65
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{9820685A-A2F6-11EE-8184-6A04C5405167} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1828 iexplore.exe 1828 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1828 wrote to memory of 3216 1828 iexplore.exe 16 PID 1828 wrote to memory of 3216 1828 iexplore.exe 16 PID 1828 wrote to memory of 3216 1828 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b9f04b7f5c0dcd3f9c2f8a142abaa56.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1828 CREDAT:17410 /prefetch:22⤵PID:3216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
8KB
MD5c05f58f8904eb11693e8ca3c1b10b9a1
SHA16efe49ff22dc2f625f62dc5c89c5b402f1b9f420
SHA25683ba5aa5d49f000accb98d0d2191e354b6f4bbbaabc12087aa8a5b2e6985fc5d
SHA512ca861bd80a5cba0c0e18c5f33173c69d38bc5cee6f6c7668027f3814b3c79fc267f02ad9a4e4aa0f3d4bfee8b06e252027e935532d1853e6743637c59feecde4